June 12 2024

Agenda

9:30 AM – 10:15 AM, Registration and Networking

Foyer

9:30 AM – 6:20 PM: Vendor Expo

Garden Terrace Room

10:20 AM – 10:35 AM, Welcome Address:
Richard Greenberg

10:40 AM – 11:25 AM, Opening Keynote
Breaking Security Silos
Robert Wood

Garden Terrace Room

11:30 AM – 12:15 PM:
TBD
TBD

Sand & Sea Room

11:30 AM – 12:15 PM:
TBD
TBD

12:15 PM – 1:35 PM, Lunch – Vendor Expo

Garden Terrace Room

1:35 PM – 2:20 PM:
TBD

Sand & Sea Room

Sand & Sea Room

2:25 PM – 3:10 PM:
TBD

3:10 PM – 3:30 PM, Break – Vendor Expo

5:05 PM – 5:25 PM, Break – Vendor Expo

Garden Terrace Room

5:25 PM – 6:10 PM Closing Keynote :

TBD

6:10 PM – 6:20 PM, Closing Remarks and Drawing, Haral Tsitsivas

6:20 PM – 8:30 PM: Happy Hour

Talk Descriptions:

Garden Terrace Room

10:40 AM – 11:25 AM

Opening Keynote: Breaking Security Silos

Robert Wood

Even in small cybersecurity teams, silos emerge that create dysfunction and friction in collaboration. Silos make it harder for security teams to effectively serve their stakeholders, to add value to their organization’s mission. In this talk we’ll explore how security teams can break down their silos and drive value in two keys ways, through intentional team alignment and through the data produced and consumed by security teams.

Garden Terrace Room

11:30 AM – 12:15 PM

Sand & Sea Room

11:30 AM – 12:15 PM

Garden Terrace Room

1:35 PM – 2:20 PM

Sand & Sea Room

1:35 PM – 2:20 PM

Deploying a Next Gen Web 3 Secure Internet

John Studarus

Web 3 applications, distributed block chains, bring about a whole new set of cyber security issues. The clients and servers are globally distributed, membership is dynamic, require high availability, open in nature and with no central authority. The existing network protocols of today just don’t provide the operational and security required for these applications. Luckily, there exist a new set of open source network protocols based upon Path Aware Networking (PAN) that provide strong cryptographic network segmentation, digital signing of data/control packets, and full end-to-end path control preventing DDoS attacks & network hijacking.

We will be walking through our experience architecting and implementing a global Web 3 Internet to support one of the major layer Web 3 chains. This is everything from our selection of the underlay network, router infrastructure, PKI (daily key rotation), netops, IXP peering with the “regular” internet, application support, network address, initial city/IXP selection, garnering user support, and global network segmentation.

We will wrap up with a walk through on the open source software packages available to set up your own PAN network or connect to one of the existing R&D PAN networks available as an Internet overlay.

Garden Terrace Room

2:25 PM – 3:10 PM

Sand & Sea Room

2:25 PM – 3:10 PM

Garden Terrace Room

3:30 PM – 4:15 PM

Enhancing Security Through Machine Learning and Artificial Intelligence: A Comprehensive Overview

Mike Cassar

Security remains a paramount concern across various domains in the contemporary landscape of rapidly evolving technology. Traditional security measures often fall short in addressing the sophisticated tactics employed by cybercriminals. In response to these challenges, there has been a surge of interest and investment in leveraging Machine Learning (ML) and Artificial Intelligence (AI) to fortify security frameworks. This paper explores the role of ML and AI in enhancing security measures, including intrusion detection, threat intelligence, anomaly detection, and authentication systems. Through a detailed examination of case studies, methodologies, and future prospects, this paper aims to comprehensively understand the intersection between security and ML/AI technologies.

Sand & Sea Room

3:30 PM – 4:15 PM

Doubling Down on Cybersecurity

James Chillingworth

Overlapping or Duplicating resources, technology and procedures can provide Cybersecurity resiliency.

Garden Terrace Room

4:20 PM – 5:05 PM

Empower Your Security: A Beginner’s Guide to Threat Modeling

James Rabe

This session focuses on teaching basic threat modeling concepts for users with little to no experience within Threat Modeling. It will focus on the 4 Questions framework and provide a physical example with the creation of a live threat model using a free software for threat modeling.

Sand & Sea Room

4:20 PM – 5:05 PM

Navigating the Security Complexities of Multi-User AI Environments

Andrew Zigler

The integration of AI into multi-user environments presents unique security challenges and opportunities. This talk delves into the critical importance of maintaining robust security measures as AI becomes increasingly integrated into organizational workflows. We will explore cutting-edge strategies to safeguard data privacy and security in multi-user AI settings, ensuring organizations can leverage AI’s full potential without compromising sensitive information.

This presentation will navigate the intricate security terrain of multi-user AI environments, focusing on AI-driven ChatOps as a pivotal example. As organizations increasingly rely on these technologies to enhance decision-making and operational efficiency, there is an imperative to secure these systems against data breaches and misuse. We will dissect the unique security challenges posed by multi-user AI systems, where multiple individuals interact with the same AI context, potentially exposing sensitive information and socially engineering one another. Participants will gain insights into the landscape of multi-user AI and its implications for organizational security, potential vulnerabilities introduced by multi-user interactions with AI systems and how to mitigate these risks, and strategies for maintaining data integrity and privacy in shared AI environments, including encryption, access controls, and anomaly detection mechanisms.

Garden Terrace Room

5:25 PM – 6:10 PM